Sciweavers

45 search results - page 2 / 9
» Behavioral Characteristics of Spammers and Their Network Rea...
Sort
View
SP
2010
IEEE
176views Security Privacy» more  SP 2010»
13 years 3 months ago
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique
Spam is increasingly accepted as a problem associated with compromised hosts or email accounts. This problem not only makes the tracking of spam sources difficult but also enables ...
Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fa...
WWW
2007
ACM
14 years 6 months ago
Analysis of topological characteristics of huge online social networking services
Social networking services are a fast-growing business in the Internet. However, it is unknown if online relationships and their growth patterns are the same as in real-life socia...
Yong-Yeol Ahn, Seungyeop Han, Haewoon Kwak, Sue B....
CW
2003
IEEE
13 years 11 months ago
Utilizing Statistical Characteristics of N-grams for Intrusion Detection
Information and infrastructure security is a serious issue of global concern. As the last line of defense for security infrastructure, intrusion detection techniques are paid more...
Zhuowei Li, Amitabha Das, Sukumar Nandi
NOMS
2008
IEEE
14 years 13 hour ago
On the multi-scale behavior of packet size distribution in Internet backbone network
—It is critical to adapt clear and representative real world traffic properties as groundwork for the contemporary and emergent future Internet workload generation. Byte count p...
Seongjin Lee, Youjip Won, Dong-Joon Shin
ECUMN
2004
Springer
13 years 11 months ago
Fairness Property and TCP-Level Performance of Unified Scheduling Algorithm in HSDPA Networks
- Channel-state-aware scheduling strategies on wireless links play an essential role for enhancing throughput performance of elastic data traffic by exploiting channel fluctuatio...
Yoshiaki Ohta, Masato Tsuru, Yuji Oie